Use integrated identity information to create and manage identities and control access to enterprise resources. We provide identity and access management, single sign-on (SSO), access governance, and more.

Detect and respond to all potential threats quickly and decisively. By monitoring user activities, security events, and critical systems, we provide actionable security intelligence to reduce the risk of data breach.

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user to forward the recently sent verification code to “validate that the phone is linked to the account”. The research demonstrates that 25% of test subjects forwarded the verification code.

This demonstrates that the need to continuously monitor the user activity is a MUST. Micro Focus helps monitor the use of credentials and alert the operators of anomalous behavior. Detect breaches in your network faster with our Security Monitoring portfolio.

Click here to visit our website for more information on how Micro Focus can help you improve security.

(0 votes, average: 0.00 out of 5)You need to be a registered member to rate this post.